首页 > 最新文献

Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking最新文献

英文 中文
Byzantine fault-tolerant consensus over random graph processes 随机图过程的拜占庭容错一致性
P. Vyavahare
In this work, we consider the problem of distributed consensus when some agents in the network are faulty and communication among agents happen over a random sequence of time-varying graphs. Agents iteratively communicate with their neighbors to achieve the consensus. We extend the network robustness condition presented in existing works on static (or time-varying but not random) graphs to the situation when communication graphs are derived from some probability distribution thus essentially random. We show that if the sequence of random graphs is uniformly stochastically robust, then the consensus can be achieved almost surely by all non-faulty agents.
在这项工作中,我们考虑了当网络中的一些代理出现故障并且代理之间的通信发生在随机的时变图序列上时的分布式共识问题。智能体迭代地与相邻智能体进行沟通,以达成共识。我们将现有关于静态(时变但非随机)图的工作中提出的网络鲁棒性条件扩展到通信图来自某种概率分布的情况,因此本质上是随机的。我们证明了如果随机图序列是一致随机鲁棒的,那么几乎可以肯定所有的非故障代理都能达成共识。
{"title":"Byzantine fault-tolerant consensus over random graph processes","authors":"P. Vyavahare","doi":"10.1145/3427477.3429771","DOIUrl":"https://doi.org/10.1145/3427477.3429771","url":null,"abstract":"In this work, we consider the problem of distributed consensus when some agents in the network are faulty and communication among agents happen over a random sequence of time-varying graphs. Agents iteratively communicate with their neighbors to achieve the consensus. We extend the network robustness condition presented in existing works on static (or time-varying but not random) graphs to the situation when communication graphs are derived from some probability distribution thus essentially random. We show that if the sequence of random graphs is uniformly stochastically robust, then the consensus can be achieved almost surely by all non-faulty agents.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114055709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nishikaze: Self-Sustained Wind Power Supply Employing Potential Energy Conversion Method Nishikaze:采用势能转换法的自持续风力电源
F. Teraoka, Shinichi Nishiura, H. Ohno
In an IoT (Internet of Things) system, if image data can be collected in addition to sensor data, the amount of information obtained will increase significantly, which is very useful for monitoring natural disasters, for example. Considering communication speed and covering range, it is assumed that Wi-Fi multi-hop communication is appropriate for image data transmission. Since Wi-Fi consumes a large amount of power, a power supply for sensor nodes is required. Therefore, we are developing a self-sustaining wind power supply called Nishikaze which employs the potential energy conversion method. In this paper, we produced the Nishikaze second prototype. The measurement results of the amount of the generated power show that the Nishikaze second prototype can cover the power required to transmit an image of 500 kbytes at a 10 minute interval assuming that 3 m/s of wind blows for 6 hours in a day, 100 % of the generated power is available, and the active period of sensor nodes is 5 seconds.
在IoT (Internet of Things)系统中,如果除了传感器数据之外,还能采集到图像数据,那么获得的信息量将会大大增加,这对于监测自然灾害等是非常有用的。考虑到通信速度和覆盖范围,假设Wi-Fi多跳通信适合图像数据传输。由于Wi-Fi的功耗很大,因此需要为传感器节点提供电源。因此,我们正在开发一种名为Nishikaze的自持式风力电源,它采用势能转换方法。在本文中,我们制作了Nishikaze第二原型机。发电量的测量结果表明,Nishikaze第二原型机可以覆盖以3米/秒的风速在一天吹6小时的情况下,以10分钟为间隔传输500 kb图像所需的功率,100%的发电量可用,传感器节点的活动周期为5秒。
{"title":"Nishikaze: Self-Sustained Wind Power Supply Employing Potential Energy Conversion Method","authors":"F. Teraoka, Shinichi Nishiura, H. Ohno","doi":"10.1145/3427477.3429460","DOIUrl":"https://doi.org/10.1145/3427477.3429460","url":null,"abstract":"In an IoT (Internet of Things) system, if image data can be collected in addition to sensor data, the amount of information obtained will increase significantly, which is very useful for monitoring natural disasters, for example. Considering communication speed and covering range, it is assumed that Wi-Fi multi-hop communication is appropriate for image data transmission. Since Wi-Fi consumes a large amount of power, a power supply for sensor nodes is required. Therefore, we are developing a self-sustaining wind power supply called Nishikaze which employs the potential energy conversion method. In this paper, we produced the Nishikaze second prototype. The measurement results of the amount of the generated power show that the Nishikaze second prototype can cover the power required to transmit an image of 500 kbytes at a 10 minute interval assuming that 3 m/s of wind blows for 6 hours in a day, 100 % of the generated power is available, and the active period of sensor nodes is 5 seconds.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124647762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Backup K-Placement and Applications to Virtual Memory in Wireless Networks 无线网络中分布式备份k位及其在虚拟内存中的应用
Gal Oren, Leonid Barenboim
The Backup Placement problem in networks in the distributed setting considers a network graph G = (V, E), in which the goal of each vertex v ∈ V is selecting a neighbor, such that the maximum number of vertices in V that select the same vertex is minimized [9]. Previous backup placement algorithms suffer from obliviousness to main factors of heterogeneous wireless network. Specifically, there is no consideration of the nodes memory and storage capacities, and no reference to a case in which nodes have different energy capacity, and thus can leave (or join) the network at any time. These parameters are strongly correlated in wireless networks, as the load on different parts of the network can differ greatly, thus requiring more communication, energy, memory and storage. In order to fit the attributes of wireless networks, this work addresses a generalized version of the original problem, namely Backup K-Placement, in which each vertex selects K neighbors, for a positive parameter K. Our Backup K-Placement algorithm terminates within just one round. In addition we suggest two complementary algorithms which employ Backup K-Placement to obtain efficient virtual memory schemes for wireless networks. The first algorithm divides the memory of each node to many small parts. Each vertex is assigned the memories of a large subset of its neighbors. Thus more memory capacity for more vertices is gained, but with much fragmentation. The second algorithm requires greater round-complexity, but produces larger virtual memory for each vertex without any fragmentation.
分布式环境下网络中的Backup Placement问题考虑一个网络图G = (V, E),其中每个顶点V∈V的目标是选择一个邻居,使得V中选择相同顶点的顶点的最大数目最小化[9]。以往的备份放置算法对异构无线网络的主要影响因素缺乏认识。具体来说,没有考虑节点的内存和存储容量,也没有提到节点具有不同能量容量的情况,因此可以随时离开(或加入)网络。这些参数在无线网络中具有很强的相关性,因为网络不同部分的负载差异很大,因此需要更多的通信、能量、内存和存储。为了适应无线网络的属性,本工作解决了原始问题的广义版本,即Backup K- placement,其中每个顶点选择K个邻居,为一个正参数K。我们的Backup K- placement算法仅在一轮内终止。此外,我们还提出了两种互补的算法,它们采用备份K-Placement来获得无线网络的有效虚拟内存方案。第一种算法将每个节点的内存分成许多小块。每个顶点被分配到其邻居的一个大子集的内存。因此,可以为更多的顶点获得更多的内存容量,但会产生更多的碎片。第二种算法需要更大的循环复杂度,但为每个顶点产生更大的虚拟内存,而不会产生任何碎片。
{"title":"Distributed Backup K-Placement and Applications to Virtual Memory in Wireless Networks","authors":"Gal Oren, Leonid Barenboim","doi":"10.1145/3427477.3429466","DOIUrl":"https://doi.org/10.1145/3427477.3429466","url":null,"abstract":"The Backup Placement problem in networks in the distributed setting considers a network graph G = (V, E), in which the goal of each vertex v ∈ V is selecting a neighbor, such that the maximum number of vertices in V that select the same vertex is minimized [9]. Previous backup placement algorithms suffer from obliviousness to main factors of heterogeneous wireless network. Specifically, there is no consideration of the nodes memory and storage capacities, and no reference to a case in which nodes have different energy capacity, and thus can leave (or join) the network at any time. These parameters are strongly correlated in wireless networks, as the load on different parts of the network can differ greatly, thus requiring more communication, energy, memory and storage. In order to fit the attributes of wireless networks, this work addresses a generalized version of the original problem, namely Backup K-Placement, in which each vertex selects K neighbors, for a positive parameter K. Our Backup K-Placement algorithm terminates within just one round. In addition we suggest two complementary algorithms which employ Backup K-Placement to obtain efficient virtual memory schemes for wireless networks. The first algorithm divides the memory of each node to many small parts. Each vertex is assigned the memories of a large subset of its neighbors. Thus more memory capacity for more vertices is gained, but with much fragmentation. The second algorithm requires greater round-complexity, but produces larger virtual memory for each vertex without any fragmentation.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127976196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Realization of a Techno-Economic Controller Deployment Architecture for vSDN Enabled 5G Networks 支持vSDN的5G网络技术经济控制器部署架构的实现
Deborsi Basu, Addanki Sankara Rao, Uttam Ghosh, R. Datta
5th Generation of Wireless Communication Networks (5G) are targeting to fulfill all the service demands of end-users in a cost-effective manner. It is becoming extremely challenging to provide optimum end-to-end network services within a restricted resource environment. Telecommunication Service Providers (TSPs) face huge trouble to minimize the network deployment cost to cover more users by increasing the network coverage area. Software Defined Networking (SDN) and Network Function Virtualization (NFV) are two key technology enablers that can improve the techno-economic scenarios for next generation telecommunication networks. In this work, we have formulated a unique load & latency aware cost-effective controller placement algorithm (ICDA – Intelligent Controller Deployment Algorithm) that can successfully reduce the cost of CAPEX (Capital Expenditure), OPEX (Operational Expenditure), and TCO (Total Cost of Ownership) of 5G networks using the concept of Virtualized Software Defined Networking (vSDN). Seamless connectivity in Ultra-Low Latency (ULL) is one of the key features of 5G. That is why we further optimize the model based on network latency and traffic load demand of the UEs (User Entities). Using comparative graphical analysis, it has been demonstrated that our proposed algorithm shows significant cost reduction in the 5G network as compared to existing current days networks. The cost-efficient controller deployment algorithm also takes care of all other critical network constraints and makes this approach very efficient for TSPs.
第五代无线通信网络(5G)旨在以经济高效的方式满足最终用户的所有业务需求。在有限的资源环境中提供最佳的端到端网络服务正变得极具挑战性。如何通过增加网络覆盖面积来降低网络部署成本以覆盖更多的用户,是电信服务提供商面临的巨大难题。软件定义网络(SDN)和网络功能虚拟化(NFV)是改善下一代电信网络技术经济场景的两个关键技术使能器。在这项工作中,我们制定了一种独特的负载和延迟感知经济高效的控制器放置算法(ICDA -智能控制器部署算法),该算法可以使用虚拟化软件定义网络(vSDN)的概念成功降低5G网络的CAPEX(资本支出),OPEX(运营支出)和TCO(总拥有成本)。超低延迟(ULL)下的无缝连接是5G的关键特性之一。因此,我们基于网络延迟和用户实体的流量负载需求进一步优化模型。通过对比图形分析,已经证明我们提出的算法与现有的网络相比,在5G网络中显着降低了成本。成本高效的控制器部署算法还考虑了所有其他关键网络约束,使这种方法对tsp非常有效。
{"title":"Realization of a Techno-Economic Controller Deployment Architecture for vSDN Enabled 5G Networks","authors":"Deborsi Basu, Addanki Sankara Rao, Uttam Ghosh, R. Datta","doi":"10.1145/3427477.3429991","DOIUrl":"https://doi.org/10.1145/3427477.3429991","url":null,"abstract":"5th Generation of Wireless Communication Networks (5G) are targeting to fulfill all the service demands of end-users in a cost-effective manner. It is becoming extremely challenging to provide optimum end-to-end network services within a restricted resource environment. Telecommunication Service Providers (TSPs) face huge trouble to minimize the network deployment cost to cover more users by increasing the network coverage area. Software Defined Networking (SDN) and Network Function Virtualization (NFV) are two key technology enablers that can improve the techno-economic scenarios for next generation telecommunication networks. In this work, we have formulated a unique load & latency aware cost-effective controller placement algorithm (ICDA – Intelligent Controller Deployment Algorithm) that can successfully reduce the cost of CAPEX (Capital Expenditure), OPEX (Operational Expenditure), and TCO (Total Cost of Ownership) of 5G networks using the concept of Virtualized Software Defined Networking (vSDN). Seamless connectivity in Ultra-Low Latency (ULL) is one of the key features of 5G. That is why we further optimize the model based on network latency and traffic load demand of the UEs (User Entities). Using comparative graphical analysis, it has been demonstrated that our proposed algorithm shows significant cost reduction in the 5G network as compared to existing current days networks. The cost-efficient controller deployment algorithm also takes care of all other critical network constraints and makes this approach very efficient for TSPs.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130498380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and Demonstration of a Resilient Content Distribution and Remote Asynchronous Learning Platform 弹性内容分发和远程异步学习平台的设计与演示
Xander Mari M. Cruz, J. L. E. Honrado, Nathaniel J. C. Libatique, G. Tangonan, C. Oppus, P. Cabacungan, John Paul A. Mamaradlo, Neil Angelo M. Mercado, Jane Arleth dela Cruz, Julie Ann Dela Cruz, J. G. Cruz
The study aims to provide a software and hardware platform for asynchronous content distribution and content management with the goal of augmenting and supporting remote learning workflows for both instructors and students in low-bandwidth situations, which is the prevailing condition in the country. The intent of the project is to enable individual school units the ability to prepare, store, and act upon educational materials for students where bandwidth is limited or non-existent without the need to install and maintain on-site traditional ICT infrastructure or rely on cloud-enabled services that require always-on connectivity. This comes at a time when the need to have a risk resilience and disaster mitigation plan for education amidst the COVID-19 pandemic-induced restrictions to human mobility leading to social isolation of educators and students alike.
该研究旨在为异步内容分发和内容管理提供一个软件和硬件平台,目标是在低带宽情况下为教师和学生增加和支持远程学习工作流,这是该国的普遍情况。该项目的目的是使单个学校单位能够为带宽有限或不存在带宽的学生准备、存储和采取行动,而无需安装和维护现场传统ICT基础设施或依赖需要始终在线连接的云服务。目前,由于COVID-19大流行对人员流动的限制导致教育工作者和学生的社会隔离,需要制定教育风险抵御能力和减灾计划。
{"title":"Design and Demonstration of a Resilient Content Distribution and Remote Asynchronous Learning Platform","authors":"Xander Mari M. Cruz, J. L. E. Honrado, Nathaniel J. C. Libatique, G. Tangonan, C. Oppus, P. Cabacungan, John Paul A. Mamaradlo, Neil Angelo M. Mercado, Jane Arleth dela Cruz, Julie Ann Dela Cruz, J. G. Cruz","doi":"10.1145/3427477.3428190","DOIUrl":"https://doi.org/10.1145/3427477.3428190","url":null,"abstract":"The study aims to provide a software and hardware platform for asynchronous content distribution and content management with the goal of augmenting and supporting remote learning workflows for both instructors and students in low-bandwidth situations, which is the prevailing condition in the country. The intent of the project is to enable individual school units the ability to prepare, store, and act upon educational materials for students where bandwidth is limited or non-existent without the need to install and maintain on-site traditional ICT infrastructure or rely on cloud-enabled services that require always-on connectivity. This comes at a time when the need to have a risk resilience and disaster mitigation plan for education amidst the COVID-19 pandemic-induced restrictions to human mobility leading to social isolation of educators and students alike.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127829452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reducing Falsely-detected Feature Points of SLAM by Estimating Obstacle-free Area for RCMSs 基于rcms无障碍区域估计的SLAM特征点检测方法
Kei Nihonyanagi, R. Katsuma, K. Yasumoto
In recent years, wireless sensor network (WSN) based monitoring systems have been applied in agricultural vermin control. For example, there are trap systems that capture vermin by automatically closing their gates. These systems need to monitor vermin that approach farmland. Ropeway camera monitoring systems (RCMSs) have been proposed as vermin monitoring mechanisms. In an RCMS, cameras can move along ropes stretched between trees or poles. However, a problem in RCMSs is that obstacles lead to poor visibility, and cameras cannot monitor areas effectively. Therefore, it is crucial to estimate locations of obstacles such as tree trunks. When estimating locations of obstacles using simultaneous localization and mapping (SLAM), it is difficult to extract feature points in dense vegetation due to noise and brightness issues. As a result, feature points are sometimes falsely detected in locations where there are no obstacles. In order to improve SLAM accuracy, falsely-detected feature points must be identified. In this study, we propose a method to estimate obstacle-free areas for an RCMS. The proposed method can determine falsely-detected feature points in estimated obstacle-free areas, and reduce errors in SLAM. The proposed method determines the largest obstacle-free areas, while reducing the number of camera shots. A camera in an RCMS also shoots other cameras while moving along its rope. When the camera captures the other cameras, we find that there are no obstacles between two cameras. The proposed method effectively identifies obstacle-free areas by moving two cameras simultaneously. From the results of a simulation with two parallel ropes, we confirmed that the proposed method determines approximately 92% of obstacle-free areas, compared with the brute-force algorithm.
近年来,基于无线传感器网络(WSN)的监测系统在农业害虫防治中得到了广泛的应用。例如,有陷阱系统,通过自动关闭大门捕捉害虫。这些系统需要监测接近农田的害虫。索道摄像机监控系统(rcms)已被提出作为害虫监测机制。在RCMS中,摄像机可以沿着树或杆子之间的绳子移动。然而,rcms中的一个问题是障碍物导致能见度低,并且摄像机不能有效地监控区域。因此,估计障碍物(如树干)的位置是至关重要的。在利用SLAM (simultaneous localization and mapping)方法估计障碍物位置时,由于噪声和亮度问题,在茂密植被中难以提取特征点。因此,在没有障碍物的地方,特征点有时会被错误地检测到。为了提高SLAM的精度,必须识别被误检的特征点。在本研究中,我们提出了一种估算RCMS无障碍区域的方法。该方法可以在估计的无障碍物区域中确定被误检的特征点,减少SLAM的误差。该方法确定了最大的无障碍区域,同时减少了相机拍摄的次数。RCMS中的摄像机在沿着绳索移动的同时也可以拍摄其他摄像机。当摄像机捕捉到其他摄像机时,我们发现两个摄像机之间没有障碍物。该方法通过同时移动两个摄像头,有效识别无障碍物区域。通过两根平行绳索的仿真结果,我们证实,与暴力算法相比,该方法确定了约92%的无障碍区域。
{"title":"Reducing Falsely-detected Feature Points of SLAM by Estimating Obstacle-free Area for RCMSs","authors":"Kei Nihonyanagi, R. Katsuma, K. Yasumoto","doi":"10.1145/3427477.3428187","DOIUrl":"https://doi.org/10.1145/3427477.3428187","url":null,"abstract":"In recent years, wireless sensor network (WSN) based monitoring systems have been applied in agricultural vermin control. For example, there are trap systems that capture vermin by automatically closing their gates. These systems need to monitor vermin that approach farmland. Ropeway camera monitoring systems (RCMSs) have been proposed as vermin monitoring mechanisms. In an RCMS, cameras can move along ropes stretched between trees or poles. However, a problem in RCMSs is that obstacles lead to poor visibility, and cameras cannot monitor areas effectively. Therefore, it is crucial to estimate locations of obstacles such as tree trunks. When estimating locations of obstacles using simultaneous localization and mapping (SLAM), it is difficult to extract feature points in dense vegetation due to noise and brightness issues. As a result, feature points are sometimes falsely detected in locations where there are no obstacles. In order to improve SLAM accuracy, falsely-detected feature points must be identified. In this study, we propose a method to estimate obstacle-free areas for an RCMS. The proposed method can determine falsely-detected feature points in estimated obstacle-free areas, and reduce errors in SLAM. The proposed method determines the largest obstacle-free areas, while reducing the number of camera shots. A camera in an RCMS also shoots other cameras while moving along its rope. When the camera captures the other cameras, we find that there are no obstacles between two cameras. The proposed method effectively identifies obstacle-free areas by moving two cameras simultaneously. From the results of a simulation with two parallel ropes, we confirmed that the proposed method determines approximately 92% of obstacle-free areas, compared with the brute-force algorithm.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115266018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Who is Trying to Compromise Your SSH Server ? An Analysis of Authentication Logs and Detection of Bruteforce Attacks 谁在试图破坏你的SSH服务器?鉴权日志分析与暴力破解检测
Pratibha Khandait, Namrata Tiwari, N. Hubballi
Secure Socket Shell (SSH) allows users to connect and access the system remotely through a publicly exposed interface. These systems often become the target of attacks where an intruder attempts to break into a system by guessing login credentials. These login attempts are generally recorded into a log file by the server. Our contribution in this paper is twofold. First we report on a case study using logs of an SSH server deployed in a production environment. Using a dataset collected over a span of one month with more than one hundred thousand connection records, we study various types of failed login attempts, common usernames being attempted, recurrence of attack sources over time and geographical location of attackers. Our case study reveals that attackers attempt various methods to break into the system, there are few common usernames which were tried persistently, origin of attacks are well spread and more than a handful number of sources make repeated attempts to break into the system spanning weeks. As a second contribution, we propose a method to differentiate failed and successful login attempts using network flow level statistics and subsequently use them to detect attacks. We experiment with flow records labelled with ground truth and show that proposed method is able to identify logins which are failed as well as successful.
Secure Socket Shell (SSH)允许用户通过公开的接口远程连接和访问系统。这些系统经常成为攻击的目标,入侵者试图通过猜测登录凭据闯入系统。这些登录尝试通常由服务器记录到日志文件中。我们在这篇论文中的贡献是双重的。首先,我们报告一个使用部署在生产环境中的SSH服务器日志的案例研究。使用一个月内收集的超过十万次连接记录的数据集,我们研究了各种类型的失败登录尝试,常见用户名的尝试,攻击源随时间的重复以及攻击者的地理位置。我们的案例研究表明,攻击者尝试了各种方法来闯入系统,很少有常见的用户名被持续尝试,攻击的起源很好地传播,并且超过少数几个来源在几周内反复尝试闯入系统。作为第二个贡献,我们提出了一种方法来区分失败和成功的登录尝试使用网络流级别统计,并随后使用它们来检测攻击。我们用标记了地面真实值的流记录进行了实验,并表明所提出的方法能够识别失败和成功的登录。
{"title":"Who is Trying to Compromise Your SSH Server ? An Analysis of Authentication Logs and Detection of Bruteforce Attacks","authors":"Pratibha Khandait, Namrata Tiwari, N. Hubballi","doi":"10.1145/3427477.3429772","DOIUrl":"https://doi.org/10.1145/3427477.3429772","url":null,"abstract":"Secure Socket Shell (SSH) allows users to connect and access the system remotely through a publicly exposed interface. These systems often become the target of attacks where an intruder attempts to break into a system by guessing login credentials. These login attempts are generally recorded into a log file by the server. Our contribution in this paper is twofold. First we report on a case study using logs of an SSH server deployed in a production environment. Using a dataset collected over a span of one month with more than one hundred thousand connection records, we study various types of failed login attempts, common usernames being attempted, recurrence of attack sources over time and geographical location of attackers. Our case study reveals that attackers attempt various methods to break into the system, there are few common usernames which were tried persistently, origin of attacks are well spread and more than a handful number of sources make repeated attempts to break into the system spanning weeks. As a second contribution, we propose a method to differentiate failed and successful login attempts using network flow level statistics and subsequently use them to detect attacks. We experiment with flow records labelled with ground truth and show that proposed method is able to identify logins which are failed as well as successful.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114558009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dispersion of Mobile Robots Tolerating Faults 移动机器人容错的离散性
D. Pattanayak, Gokarna Sharma, P. Mandal
The dispersion problem on graphs asks k ≤ n robots initially placed arbitrarily on the nodes of an n-node anonymous graph to reposition autonomously to reach a configuration with each robot on a distinct node. This problem is of interest due to its relationship to many fundamental robot coordination problems, such as exploration, scattering, load balancing, relocation of self-driven electric cars (robots) to recharge stations (nodes), etc. The objective of this problem is to minimize simultaneously (or provide trade-off between) two fundamental performance metrics: (i) time to achieve dispersion and (ii) memory needed at each robot. The literature solved this problem on arbitrary graphs considering fault-free robots. In this paper, we study dispersion on arbitrary graphs considering crash faulty robots – a robot which has crashed vanishes from the system along with the information it carried. We present a deterministic O((min (m, kΔ) · f) time algorithm achieving dispersion with O(log (max (k, Δ))) bits memory at each robot starting from rooted initial configurations such that all k robots are on a single node, where m is the number of edges, f ≤ k is the number of crashes, and Δ is the maximum degree of the graph. When Δ and f are both O(1), time complexity of our algorithm asymptotically matches the lower bound Ω(k) and when Δ and f are both polylog(n), it is polylog(n) factor away from the lower bound Ω(k). The memory bound is asymptotically optimal. To the best of our knowledge, this is the first result for dispersion with faults in arbitrary graphs, even when starting from rooted initial configurations.
图上的分散问题要求初始任意放置在n节点匿名图节点上的k≤n个机器人自主重新定位,以达到每个机器人在不同节点上的配置。该问题涉及许多基本的机器人协调问题,如探索、分散、负载平衡、自动驾驶电动汽车(机器人)向充电站(节点)的迁移等,因此引起人们的兴趣。这个问题的目标是同时最小化(或提供折衷)两个基本性能指标:(i)实现分散的时间和(ii)每个机器人所需的内存。文献在考虑无故障机器人的任意图上解决了这个问题。在本文中,我们研究了考虑崩溃故障机器人的任意图上的色散——一个机器人在崩溃后连同它所携带的信息一起从系统中消失。我们提出了一种确定性的O((min (m, kΔ)·f)时间算法,以O(log (max (k, Δ))位内存实现每个机器人从根初始配置开始的分散,使得所有k个机器人都在单个节点上,其中m是边的数量,f≤k是崩溃的数量,Δ是图的最大程度。当Δ和f都是O(1)时,我们的算法的时间复杂度渐近地匹配下界Ω(k),当Δ和f都是polylog(n)时,它是polylog(n)远离下界Ω(k)的因子。内存界是渐近最优的。据我们所知,这是任意图中带有错误的色散的第一个结果,即使从根初始配置开始也是如此。
{"title":"Dispersion of Mobile Robots Tolerating Faults","authors":"D. Pattanayak, Gokarna Sharma, P. Mandal","doi":"10.1145/3427477.3429464","DOIUrl":"https://doi.org/10.1145/3427477.3429464","url":null,"abstract":"The dispersion problem on graphs asks k ≤ n robots initially placed arbitrarily on the nodes of an n-node anonymous graph to reposition autonomously to reach a configuration with each robot on a distinct node. This problem is of interest due to its relationship to many fundamental robot coordination problems, such as exploration, scattering, load balancing, relocation of self-driven electric cars (robots) to recharge stations (nodes), etc. The objective of this problem is to minimize simultaneously (or provide trade-off between) two fundamental performance metrics: (i) time to achieve dispersion and (ii) memory needed at each robot. The literature solved this problem on arbitrary graphs considering fault-free robots. In this paper, we study dispersion on arbitrary graphs considering crash faulty robots – a robot which has crashed vanishes from the system along with the information it carried. We present a deterministic O((min (m, kΔ) · f) time algorithm achieving dispersion with O(log (max (k, Δ))) bits memory at each robot starting from rooted initial configurations such that all k robots are on a single node, where m is the number of edges, f ≤ k is the number of crashes, and Δ is the maximum degree of the graph. When Δ and f are both O(1), time complexity of our algorithm asymptotically matches the lower bound Ω(k) and when Δ and f are both polylog(n), it is polylog(n) factor away from the lower bound Ω(k). The memory bound is asymptotically optimal. To the best of our knowledge, this is the first result for dispersion with faults in arbitrary graphs, even when starting from rooted initial configurations.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122022257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An ensemble model for intrusion detection in the Internet of Softwarized Things 一种软件物联网入侵检测集成模型
Gautam Srivastava, G. T. Reddy, N. Deepa, B. Prabadevi, Praveen Kumar Reddy Maddikunta
In recent years, there has been a rapid increase in the applications generating sensitive and personal information based on the Internet of Things (IoT). Due to the sensitive nature of the data there is a huge surge in intruders stealing the data from these applications. Hence a strong intrusion detection systems which can detect the intruders is the need of the hour to build a strong defence systems against the intruders. In this work, a Crow-Search based ensemble classifier is used to classify IoT- based UNSW-NB15 dataset. Firstly, the most significant features are selected from the dataset using Crow-Search algorithm, later these features are fed to the ensemble classifier based on Linear Regression, Random Forest and XGBoost algorithms for training. The performance of the proposed model is then evaluated against the state-of-the-art models to check for its effectiveness. The experimental results prove that the proposed model performs better than the other considered models.
近年来,基于物联网(IoT)产生敏感和个人信息的应用迅速增加。由于数据的敏感性,从这些应用程序窃取数据的入侵者数量激增。因此,一个强大的入侵检测系统,能够检测到入侵者是建立一个强大的防御系统的需要。在这项工作中,使用基于crowo - search的集成分类器对基于物联网的UNSW-NB15数据集进行分类。首先使用Crow-Search算法从数据集中选择最显著的特征,然后将这些特征馈送到基于线性回归、随机森林和XGBoost算法的集成分类器中进行训练。然后根据最先进的模型对所提出模型的性能进行评估,以检查其有效性。实验结果表明,该模型的性能优于其他考虑的模型。
{"title":"An ensemble model for intrusion detection in the Internet of Softwarized Things","authors":"Gautam Srivastava, G. T. Reddy, N. Deepa, B. Prabadevi, Praveen Kumar Reddy Maddikunta","doi":"10.1145/3427477.3429987","DOIUrl":"https://doi.org/10.1145/3427477.3429987","url":null,"abstract":"In recent years, there has been a rapid increase in the applications generating sensitive and personal information based on the Internet of Things (IoT). Due to the sensitive nature of the data there is a huge surge in intruders stealing the data from these applications. Hence a strong intrusion detection systems which can detect the intruders is the need of the hour to build a strong defence systems against the intruders. In this work, a Crow-Search based ensemble classifier is used to classify IoT- based UNSW-NB15 dataset. Firstly, the most significant features are selected from the dataset using Crow-Search algorithm, later these features are fed to the ensemble classifier based on Linear Regression, Random Forest and XGBoost algorithms for training. The performance of the proposed model is then evaluated against the state-of-the-art models to check for its effectiveness. The experimental results prove that the proposed model performs better than the other considered models.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121480913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
VDA: Deep Learning based Visual Data Analysis in Integrated Edge to Cloud Computing Environment VDA:基于深度学习的集成边缘到云计算环境中的可视化数据分析
Atanu Mandal, Amir Sinaeepourfard, S. Naskar
In recent years, video surveillance technology has become pervasive in every sphere. The manual generation of videos’ descriptions requires enormous time and labor, and sometimes essential aspects of videos are overlooked in human summaries. The present work is an attempt towards the automated description generation of Surveillance Video. The proposed method consists of the extraction of key-frames from a surveillance video, objects detection in the key-frames, natural language (English) description generation of the key-frames, and summarizing the descriptions. The key-frames are identified based on a structural similarity index measure. Object detection in a key-frame is performed using the architecture of Single Shot Detection. We used Long Short Term Memory (LSTM) to generate captions from frames. Translation Error Rate (TER) is used to identify and remove duplicate event descriptions. Term frequency-inverse document frequency (TF-IDF) is used to rank the event descriptions generated from a video, and the top-ranked the description is returned as the system generated a summary of the video. We evaluated the Microsoft Video Description Corpus (MSVD) data set to validate our proposed approach, and the system produces a Bilingual Evaluation Understudy (BLEU) score of 46.83.
近年来,视频监控技术已经普及到各个领域。人工生成视频描述需要大量的时间和人力,有时在人工总结中忽略了视频的重要方面。本文的工作是对监控视频自动描述生成的一种尝试。该方法包括从监控视频中提取关键帧,检测关键帧中的目标,生成关键帧的自然语言描述,并对描述进行汇总。关键帧的识别基于结构相似度指标。关键帧中的目标检测采用单镜头检测的架构。我们使用长短期记忆(LSTM)从帧中生成字幕。翻译错误率(Translation Error Rate, TER)用于识别和删除重复的事件描述。术语频率逆文档频率(TF-IDF)用于对视频生成的事件描述进行排序,排名靠前的描述作为系统生成的视频摘要返回。我们评估了微软视频描述语料库(MSVD)数据集来验证我们提出的方法,系统产生了双语评估替补(BLEU)得分46.83。
{"title":"VDA: Deep Learning based Visual Data Analysis in Integrated Edge to Cloud Computing Environment","authors":"Atanu Mandal, Amir Sinaeepourfard, S. Naskar","doi":"10.1145/3427477.3429781","DOIUrl":"https://doi.org/10.1145/3427477.3429781","url":null,"abstract":"In recent years, video surveillance technology has become pervasive in every sphere. The manual generation of videos’ descriptions requires enormous time and labor, and sometimes essential aspects of videos are overlooked in human summaries. The present work is an attempt towards the automated description generation of Surveillance Video. The proposed method consists of the extraction of key-frames from a surveillance video, objects detection in the key-frames, natural language (English) description generation of the key-frames, and summarizing the descriptions. The key-frames are identified based on a structural similarity index measure. Object detection in a key-frame is performed using the architecture of Single Shot Detection. We used Long Short Term Memory (LSTM) to generate captions from frames. Translation Error Rate (TER) is used to identify and remove duplicate event descriptions. Term frequency-inverse document frequency (TF-IDF) is used to rank the event descriptions generated from a video, and the top-ranked the description is returned as the system generated a summary of the video. We evaluated the Microsoft Video Description Corpus (MSVD) data set to validate our proposed approach, and the system produces a Bilingual Evaluation Understudy (BLEU) score of 46.83.","PeriodicalId":435827,"journal":{"name":"Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133480570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1